P. E. S.
COLLEGE OF ENGINEERING, MANDYA - 517401
(An Autonomous Institution Affiliated to Visvesvaraya Technological
University, Belagavi)
MINI PROJECT REPORT ON
“PRISON MANAGEMENT SYSTEM”
Submitted in partial fulfilment of the requirement
for the award of the
BACHELOR OF ENGINEERING DEGREE
Submitted by:
BHAVANA K [4PS19IS011]
BHAVANA R [4PS19IS012]
CHAITRASHREE [4PS19IS014]
Under the guidance of:
M S RAKSHITHA
Assistant professor,
Dept. of IS&E,
PESCE, Mandya
DEPARTMENT OF INFORMATION SCIENCE & ENGINEERING
P. E. S. COLLEGE OF ENGINEERING, MANDYA _ 571401
(An Autonomous Institution Affiliated to VTU, Belagavi)
PES COLLEGE OF ENGINEERING, MANDYA - 571401
(An Autonomous Institution Affiliated to VTU, Belagavi)
DEPARTMENT OF INFORMATION SCIENCE &ENGINEERING
CERTIFICATE
This is to certify that, BHAVANA K[4PS19IS011], BHAVANA R[4PS19IS012],
CHAITRASHREE[4PS19IS014] have successfully completed the Third Year entitled
“PRISON MANAGEMENT SYSTEM” in partial fulfilment for the award of
degree of Bachelor of Engineering in Information Science and Engineering of P.E.S. College
of Engineering Mandya, VTU Belagavi during the year 2020-2021. It is certified that all
corrections indicated in internal assessment have been incorporated in the report deposited
in the library. The mini project work has been approved as it satisfies the academic
requirements in respect of mini project work prescribed for the degree in Bachelor of
Engineering.
Signature of the Guide Head of the Department
M S Rakshitha Dr. M l Anitha
Assistant Professor, Professor & Head,
Dept of ISE Dept. of IS&E
Details of Mini Project [P18ISL56] Viva Voce Examination
held
Examine
Sl. rs Da
No
Na Signature te
.
me
1
2
3
P E S COLLEGE OF ENGINEERING MANDYA
(An Autonomous Institute under VTU, Belagavi)
Department of Information Science and Engineering
DECLARATION
We students of 5th semester Bachelor of Engineering in Information Science and Engineering, PESCE
Mandya, hereby declare that the project work being presented in the entitled “PRISON
MANAGEMENT SYSTEM” is an authentic record of the work that has been
independently carried out by us and submitted in partial fulfilment of the requirements for the award
of degree in semester Bachelor of Engineering in Information Science, affiliated to Visvesvaraya
Technological University (VTU), Belagavi during the year 2020-2021.The work contained in the
report has not been submitted in part or full to any other university or institution or professional body for the
award of any degree or any fellowship.
Date: BHAVANA K (4PS19IS011)
Place: Mandya BHAVANA R (4PS19IS012)
CHAITRASHREE
(4PS19IS014)
ACKNOWLEDGEMENT
Our report acknowledges some guidance, some supervision and a lot of inspiration. It is now time to
acknowledge our obligation to all who have extended their co-operation all along with our study
tenure of project work.
We take this pleasure in thanking, our beloved Principal Dr. R M MAHALINGE GOWDA, PES
College of Engineering, Mandya, who has always been a great source of inspiration and has
encouraged us through.
We would like to convey our heart full thanks to our Head of the Department of Information
Science and Engineering, Dr. M L ANITHA, for being there in monitoring us through our
project work.
We wish to express our deep sense of gratitude to our project guide M S RAKSHITHA,
Assistant Professor, Department of Information Science & Engineering for her guidance and
useful suggestions throughout our project work and we are thankful for her time, effort and also
for her continued encouragement in preparing this report.
We thank one and all who have helped us directly or in-directly in completing our project work.
BHAVANA K [4PSI19IS011]
BHAVANA R [4PS19IS012]
CHAITRASHREE[4PS19IS014]
ABSTRACT
Prisoner’s management has long been a neglected area and has only recently been included in the
20-22vision document under the e-governance. Currently, prisoner’s records are maintained in a very
rudimentary way in the form of manual files and registers. This method of data management often
results in human error, delay to retrieve information etc. Thus, An Online Prison Management
System was designed and implemented to manage prisoner’s records
The purpose of this project is to present a detailed description of the Prison Management System.
The document will describe what the system will do, the constraints under which it must operate and
how the system will react to external stimuli. This system contains the modules like Registration,
Login, Adding Prisoner, Adding the Jailers, Adding a visitor and Displaying the visitation log
Basic html was utilized for visible web content, php for server programming, and a Microsoft SQL
database was used to store and manage the prisoner's records in this project. Dreamweaver CS5 html
editor, CSS3 for styling, php wamp5server, and Microsoft SQL are being used to complete this
project
. The project was completed successfully, and the final outcome is a single management system that
incorporates all of a prisoner's information into a single profile that can be easily accessed, enhancing
the overall efficiency of prison management.
Serial no. Contents Page No
1. Introduction
1.1 Problem
Definition
1.2 Objective of
project
2. System Analysis
10-12
2.1 Existing System
2.2 Proposed System
2.3 Functional Requirements
2.4 Software and Hardware
Requirements
3. System design and Architecture
12-14
4. Feasibility Report
14-17
4.1 Technical Feasibility
4.2 Operation Feasibility
4.3 Economic Feasibility
5. System Design 17-18
6. Snapshots 18-28
7. System Testing 28-29
Conclusions 29
Reference
1.INRODUCTION
Management of prisons has long been a neglected area which has recently been incorporated in
the e-governance program of Government. Currently a rudimentary process of storing all the
prisoner data in manual files and registers is in place.
The Prison Management System project will integrate all the prisoner data into single integrated
system which will in turn result all the information being present in a digital format.
This system is named as Prison management system. This system is made to keep records about the
prisoners and about the guards. Jailor can log in as a user and can add the details of prisoners like
name, age, address, crime, and punishment.
In order to cope up with the increasing number of prisoners being lodged, the Administration
required a re-engineering and rationalization of their key business processes and functions of
prisoners’ related information and their computerization in order to speed up the processing of
information need of courts and various other national agencies.
Jailors can also add the details about the different guards that are on duty. Jailor can change
attributes like time-shift duty hours of guards. Jailor can also write the First Information Report
and can save it.
This system has the-the capability to maintain an infinite number of records. It is very useful as
the written papers have a limited time period and can get lost but in the prison management
system, this is not possible as a backup file will be created automatically and also updated
automatically when any change is made in any record.
There is no option to delete a prisoner’s record because it may be required later by the
government to know any details about the person and can help in the tracking of the prisoner.
1.1 PROBLEM DEFINATION
Management of prison is still at a nascent stage and follows rudimentary processes. Most of the
prisons have a collection of manual files and registers to store prisoner/criminal records. This is a
very inefficient and cumbersome way of storing records which greatly impedes the flow of critical
information as well as makes looking up of information time consuming.
Also, different files and registers are required to store the information which is relevant to a single
prisoner. This hinders the profiling process of prisoners.
1.2 OBJECTIVES OF PROJECT
1. The objective of Prison Management system is to develop a web-based program using which prison
system can be easily managed.
2. It provides the facility of displaying the details of prisoners, jailers, prison employment, visitation
log.
3. It also provides the facility to insert and update the records
4. To ensure proper monitoring of the prisons by the top officials.
5. To ensure that the discipline and decorum of the jails is maintained by both the employees and the
prisoners.
6. To ensure that no impersonation of the prisoners happens by proper validation and
authentication of the prisoner’s identity.
7. To improve the productivity and efficiency of the prisons so as to facilitate the usage of the available
work force for sensitive work while leveraging technology to reduce the mundane workload of the
employees.
8. To ensure the availability of data in digital form for preservation, analysis and reporting.
2.SYSTEM ANALYSIS
2.1 EXISTING SYSTEM
The old system recorded the details of the prisoner and jailer. The prisoner’s arriving year, release year, the
charge, age and gender are recorded. The jailer’s name, age, gender, supervising ward are recorded. This
system has the capability to maintain an infinite number of records. It is very useful as the written papers
have a limited time period and can get lost but in the prison management system, this is not possible as a
backup file will be created automatically and also updated automatically when any change is made in any
record
2.2 PROPOSED SYSTEM
This system also records the visitation logs and prison industry. Admin enters the details of the visitor like the
name of the visitor, relationship with the prisoner, date and time of visit. Admin also adds the details of the
prisoner like the name of the prisoner, which part of the prison he is working , what work , day and time , and
the guard on duty for the prison employment table .There is no option to delete a prisoner’s record because it
may be required later by the government to know any details about the person and can help in the tracking of
the prisoner.
2.3 FUNCTIONAL REQUIREMENTS
MODULES OF PRISON MANAGEMENT SYSTEM
Registration:
Users’ data need to be registered in the prison management system so as to use the
system and add the prisoner’s details, the guard’s duty shift, etc. If the user is not registered in the
prison management system, he/she cannot do any task with it like adding prisoner, crime and
punishment details, etc.
Login:
After registration one can log in to the system as the operator of the system on the behalf
of the user. After this, he has the other user interfaces available for further actions
Adding Prisoner:
The second option that is given in this is one of the most important that is adding prisoners.
As soon as the court declares that the victim is found guilty and tells his or her punishment and in
which prison the victim must be kept, the prisoner will be sent to the same prison as told by the court
and all the details of the criminal like name, age, prisoner Id , crime and the punishment all can be
updated in the prison management system, Then later these details can be used further and there is no
option to delete the prisoner’s data so once the prisoner is added to the database, no one can delete
the data of the criminal and it will be helpful as papers can get lost or can be theft but, in this case,
information cannot be lost and there is no use of theft this data as no changes can be made in the
database. Prisoners’ data cannot be lost because the backup of the database is there and the backup
gets updated as soon as the changes are made into the database
Adding the Jailers:
The third important feature that is provided by this system is adding the details about the
jailer of the prison. Therefore, an option is provided to the user to add the jailers if any new jailer
gets transferred. The options that are asked during adding a jailer detail are name, age, gender, shift,
so that details of any jailer can be checked.
Adding a visitor:
The visitor is supposed to sign in before visiting the prisoner. Their details such as name,
relationship with the prisoner, visiting time, visiting date and the prisoner id are entered during the
time of their sign in. On adding a visitor to the log, the prisoner’s previous visitation record will be
displayed.
Displaying the visitation log:
The records of the people visiting the prisoners is maintained. The list of people visiting a
particular prisoner can be obtained upon entering the prisoner id
2.4 SOFTAWARE AND HARDWARE REQUIREMENTS
HARDWARE REQUIREMENTS:
● PROCESSOR: AMD Ryzen 7 4700U with Radeon Graphics
● 2.00GHz.RAM: Minimum 8GB RAM capacity.
● HARD DISK: 512GB SSD. 6
● Fast and high bandwidth internet connection.
SOFTWARE REQUIREMENTS:
OPERATING SYSTEM: WINDOWS 10 (or) WINDOWS
7. FRONTEND PLATFORM:
● HTML
● CSS
BACKEND PLATFORM:
● MICROSOFT SQL
● PHP (APACHE SERVER)
WEB BROWSERS: Google Chrome, Firefox.
3.SYSTEM DESIGN AND ARCHITECTURE
DESIGN
As discussed above, the website is made using MICROSOFTSQL, PHP and the frontend is
made using HTML AND CSS the details of these libraries are explained below.
MICROSOFT SQL
SQL Server Management Studio (SSMS) is an integrated environment for managing any SQL
infrastructure. Use SSMS to access, configure, manage, administer, and develop all components of
SQL Server, Azure SQL Database , Azure SQL Managed Instance, SQL Server on Azure VM, and
Azure Synapse Analytics. SSMS provides a single comprehensive utility that combines a broad
group of graphical tools with many rich script editors to provide access to SQL Server for
developers and database administrators of all skill levels. SQL infrastructure, from SQL Server to
Azure SQL Database. SSMS provides tools to configure, monitor, and administer instances of SQL
Server and databases. Use SSMS to deploy, monitor, and upgrade the data-tier components used by
your applications, and build queries and scripts. Use SSMS to query, design, and manage your
databases and data warehouses, wherever they are - on your local computer, or in the cloud.
PHP
PHP is a programming language. It can be embedded into HTML, which is the big draw for
anyone interested in web development. Where HTML can be long, with lots of commands, PHP
pages contain HTML with embedded code, making it much easier to manage. PHP stands for
Hypertext Pre-processor which, in itself is confusing. It’s not actually as complicated as it seems
though – if you have a basic understanding of HTML, PHP is going to be pretty easy to learn. It
allows you to collect, process and utilize data to create output – basically it allows you to interact
with all your pages.
HTML
HTML is an acronym which stands for Hyper Text Markup Language which is used for
creating web pages and web applications. Let's see what is meant by Hypertext Markup Language,
and Web page.
Hyper Text
Hypertext simply means “Text within Text”. A text has a link within it, it is a hypertext.
Whenever you click on a link which brings you to a new webpage, you have clicked on a hypertext.
Hypertext is a way to link two or more web pages (HTML documents) with each other.
Markup language
A markup language is a computer language that is used to apply layout and formatting
conventions to a text document. Markup language makes text more interactive and dynamic.8
It can turn text into images, tables, links, etc.
Web Page
A web page is a document which is commonly written in HTML and translated by a web
browser. A web page can be identified by entering an URL. A Web page can be of the static or
dynamic type. With the help of HTML only, we can create static web pages.
Hence, HTML is a markup language which is used for creating attractive web pages with the help
of styling, and which looks in a nice format on a web browser. An HTML document is made of
many HTML tags and each HTML tag contains different content.
CSS
CSS stands for Cascading Style Sheets. It is a style sheet language which is used to describe the
look and formatting of a document written in markup language. It provides an additional feature to
HTML. It is generally used with HTML to change the style of web pages and user interfaces. It can
also be used with any kind of XML documents including plain XML, Sanad XUL.
CSS is used along with HTML and JavaScript in most websites to create user interfaces for
web applications and user interfaces for many mobile applications.
4.FEASIBILITY REPORT
Preliminary investigation examines project feasibility, the likelihood the system will be useful to
the organization. The main objective of the feasibility study is to test the Technical, Operational and
Economical feasibility for adding new modules and debugging old running system. All system is
feasible if they are unlimited resources and infinite time. There are aspects in the feasibility study
portion of the preliminary investigation:
● Technical Feasibility
● Operation Feasibility
● Economic Feasibility
4.1Technical Feasibility
The technical issue usually raised during the feasibility stage of the investigation
includes the following:
● Does the necessary technology exist to do what is suggested?
● Do the proposed equipment’s have the technical capacity to hold the data required to use the
new system?
● Will the proposed system provide adequate response to inquiries, regardless of the
number or location of users?
● Can the system be upgraded if developed?
● Are there technical guarantees of accuracy, reliability, ease of access and
data security?
Earlier no system existed to cater to the needs of ‘Secure Infrastructure Implementation 10
System’. The current system developed is technically feasible. It is a web-based user interface.
Thus, it provides an easy access to the users. The database’s purpose is to create, establish and
maintain a workflow among various entities in order to facilitate all concerned users in their
various capacities or roles. Permission to the users would be granted based on the roles specified.
Therefore, it provides the technical guarantee of accuracy, reliability and security.
The software and hard requirements for the development of this project are not many and are
available as free as open source. The work for the project is done with the current equipment and
existing software technology. Necessary bandwidth exists for providing a fast feedback to the users
irrespective of the number of users using the system.
4.2Operational Feasibility
Proposed projects are beneficial only if they can be turned out into information system.
That will meet the organization’s operating requirements. Operational feasibility aspects of the
project are to be taken as an important part of the project implementation. Some of the important
issues raised are to test the operational feasibility of a project includes the following:
-
● Is there sufficient support for the management from the users?
● Will the system be used and work properly if it is being developed and implemented?
● Will there be any resistance from the user that will undermine the possible application benefits?
This system is targeted to be in accordance with the above-mentioned issues. Beforehand, the
management issues and user requirements have been taken into consideration. So, there is no
question of resistance from the users that can undermine the possible application benefits.
The well-planned design would ensure the optimal utilization of the computer resources and
would help in the improvement of performance status.
4.3Economic Feasibility
A system can be developed technically and that will be used if installed must still be a good investment
for the organization. In the economic feasibility, the development cost in creating 11 the system is evaluated
against the ultimate benefit derived from the new systems. Financial benefits must equal or exceed the costs.
The system is economically feasible. It does not require any addition hardware or software. Since the
interface for this system is developed using the existing resources and technologies.
There is nominal expenditure and economic feasibility for certain. The software, Site Explorer is designed
for management of web sites from a remote location.
5.SYSTEM DESIGN
5.1ER-DIAGRAM
● The relation upon the system is structure through a conceptual ER-Diagram, which not
only specifics the existential entities but also the standard relations through which the system
exists and the cardinalities that are necessary for the system state to continue.
● The entity Relationship Diagram (ERD) depicts the relationship between the data objects.
The ERD is the notation that is used to conduct the date modeling activity the attributes of each
data object noted is the ERD can be described resign a data object description.
● The set of primary components that are identified by the ERD are
● Data object
● Relationships
● Attributes
● Various types of indicators.
The primary purpose of the ERD is to represent data objects and their relationship
Fig 5.1 ER-Diagram for Prison management System
6 SNAPSHOT
7 PRISON TABLE
Table 6.1 Prison table of prison management system
CRIME TABLE
Table 6.2 Crime table of prison management system
JAILER TABLE
Table 6.3 Jailer table of prison management system
VISITATION LOG TABLE
Table 6.4 Visitation log table of prison management system
PRISON EMPLOYMENT TABLE
Table 6.5 Prison Employment table of prison management system
Website
Fig 6.6 Snapshot of website page of prison management system
ABOUT
Fig 6.7 Snapshot of about option in prison management system website
FEATURES
Fig 6.8 Snapshot of Features of prison management system website
INSERT PRISONER
Fig 6.8 Snapshot of Insert Prisoner option in prison management system website
PRISONER UPDATE
Fig 6.9 Snapshot of Prisoner Update option in prison management system website
JAILOR LOGIN
Fig 6.10 Snapshot of Jailor Login option in prison management system website
INSERT JAILOR
Fig 6.11 Snapshot of Insert Jailor option in prison management system website
VISITORS
Fig 6.12 Snapshot of Visitors option in prison management system website
VISITORS LOG
Fig 6.13 Snapshot of Visitors Log option in prison management system website
CONTACT
Fig 6.14 Snapshot of contact option in prison management system website
7.SYSTEM TESTING
As the part of system testing, we execute the program with the intent of finding errors and missing
operations and also a complete verification to determine whether the objectives are met and the user
requirements are satisfied. The ultimate aim is quality assurance. Tests are carried out and the results are
compared with the expected document. In the case of erroneous 23 results, debugging is done. Using
detailed testing strategies, a test plan is carried out on each module. The various tests performed are unit
testing, integration testing and user acceptance testing.
Unit Testing: The software units in the system is are modules and routines that are assembled and integrated
to perform a specific function. As a part of unit testing, we executed the program for individual modules
independently. This enables, to detect errors in coding and logic that are contained within each of the three
modules. This testing includes entering data that is filling forms and ascertaining if the value matches to the
type and entered into the database. The various controls are tested to ensure that each performs its action as
required.
Integration Testing: Data can be lost across any interface, one module can have an adverse effect on
another, sub functions when combined, may not produce the desired major functions. Integration testing is a
systematic testing to discover errors associated within the interface. The objective is to take unit tested
modules and build
a program structure. All the modules are combined and tested as a whole. Here the admin module, sec
module and student module options are integrated and tested. This testing provides the assurance that the
application is well integrated functional unit with smooth transition of data.
User Acceptance Testing: User acceptance of a system is the key factor for the success of any
system. The system under consideration is tested for user acceptance by constantly keep the records
of applicants and making changes to the details and password whenever required.
Test
SL.NO Expected Actual Remarks
case Explanation
Name output output
1. Acceptance Insertion of Prisoner ID, age, Prisoner ID, age, PASS
prisoner’s name, crime type, name, crime type,
details ward, release ward, release
year, work time, year, work time,
name, gender, name, gender,
charges, charges,
admission year, admission year,
Type of work, Type of work,
wages wages is accepted
Should accept successfully
2. Acceptance Insertion of Prisoner ID, age, Prisoner ID, age, FAIL
prisoner’s name, crime type, name, crime type,
details ward, release ward, release
year, work time, year, work time,
name, gender, name, gender,
charges, charges,
admission year, admission year,
Type of work, Type of work,
wages wages not
Not accepted accepted
3. Updation Updation of Prisoner ID, Prisoner ID, PASS
prisoner’s wages, Type of wages, Type of
details work, ward work, ward
Updated Updated
successfully Successfully
4. Acceptance Updation of Prisoner ID, Prisoner ID, FAIL
prisoner’s wages, Type of wages, Type of
details work, ward work, ward
Not accept not accepted
5. Authentication Prisoner ID Prisoner ID and Prisoner ID and PASS
and password password will be password is
confirmation accepted accepted
6. Authentication Prisoner ID Prisoner ID and Prisoner ID and FAIL
and password password should password is not
confirmation not match matched
7. Acceptance Adding jailors Jailor ID, age, Jailor ID, age, PASS
details Supervision, Supervision,
name, Gender name, Gender
accepted Accepted
successfully
8. Acceptance Adding jailors Jailor ID, age, Jailor ID, age, FAIL
details Supervision, Supervision,
name, Gender name, Gender
Not accepted Not accepted
9. Acceptance Visitors’ S Name, prisoner Name, prisoner PASS
details ID, time, relation, ID, time, relation,
date date is accepted
Should accept
10. Acceptance Visitor’s Name, prisoner Name, prisoner FAIL
details ID, time, relation, ID, time, relation,
date date Not accepted
Not accepted
11. Authentication Prisoner ID Prisoner ID and Prisoner ID and PASS
and password password will be password is
confirmation accepted accepted
for visitor log
12. Authentication Prisoner ID Prisoner ID and Prisoner ID and FAIL
and password password should password is not
confirmation not match matched
for visitor log
Conclusion & Further improvements of the project
Further improvements of the project
o The further improvements that can be done to this project is we can incorporate the
rotation of the shifts of the duty of the jailers.
o We can enhance the security of the login credentials of the jailers and the prisoners.
o The visitors can also be provided the facility to pre book the visiting slots to visit the prisoners
Conclusion
In the modern world, the use of computers and mobile phones is becoming rampant, more so,
recent development in the ICT industries has revolutionized and accomplished. As a result, the, prison
management system needs to embrace new technologies. This report has presented a simple,
convenient, cost-friendly, sensitive and intelligible web interface. Whereby it can be accessed at any
time provided there is internet connection.
This system is named as Prison management system. This system is made to keep records about the
prisoners and about the guards. Jailor can log in as a user and can add the details of prisoners like
name, age, address, crime, and punishment. We have used many modules like Registration, Login,
Adding prisoner, Adding the jailers, Adding visitors and Displaying the visitation log.
Jailors can also add the details about the different guards that are on duty. Jailor can change
attributes like time-shift duty hours of guards. Jailor can also write the First Information Report
and can save it.
This system has the-the capability to maintain an infinite number of records. It is very useful as
the written papers have a limited time period and can get lost but in the prison management
system, this is not possible as a backup file will be created automatically and also updated
automatically when any change is made in any record.
There is no option to delete a prisoner’s record because it may be required later by the
government to know any details about the person and can help in the tracking of the prisoner.
So, the outcome of all the-the hard work did for the prison management system is here. It is
software that helps the user to work with the prisons easily. This software reduces the amount of
manual data entry and gives greater efficiency. The User Interface of it is very friendly and can
be easily used by anyone.
It also decreases the amount of time taken to write FIR details and other modules. In the end, we
can say that this software is performing all the tasks accurately and is doing the work for which
it is made.
REFERENCE
● Government department analysis of e-governance application,
http://www.mit.gov.in/sites/upload_files/dit/files/State%20-%20karnatakapdf
● . The Database Management Systems: Raghu Ramakrishnan, Johannes Gehrke, Mc Graw Hill
Education, 3rd Edition
● Taken reference from journals by:
Gollnick, D. & Chinn, P. (1990). Multicultural education in a pluralistic society (3rd ed.). New
York: MacMillan.
Hoffman, M (1987). Empathy and its development. New York: Cambridge University Press.
Jordan, J. (1991). Women’s growth in connection: Writings from the Stone Center. New York:
Guilford.
Jurik, N. (2006). Individual and organizational determinants of correctional officer attitudes
toward inmates. Criminology, 23(3), 523-539
https://www.researchgate.net/publication/282438197_Exemplary_prisoner_management
● . Referred the below pinned you tube videos for Php and Microsoft.
https://youtu.be/6oSWzvJMbBQ
https://youtu.be/OK_JCtrrv-c